Filters








29,716 Hits in 4.7 sec

On Lattice-Based Signatures with Advanced Functionalities

Nabil Alkeilani Alkadri
2022
While ordinary signature schemes based on lattices are ready to be deployed in practice, this statement cannot be made for lattice-based signature schemes with advanced functionalities.  ...  In this thesis, we are specifically interested in lattice-based signature schemes with advanced functionalities.  ...  With focus on signature schemes with advanced functionalities, we went on to analyze lattice-based (interactive) protocols with multiple rejection sampling procedures.  ... 
doi:10.26083/tuprints-00020793 fatcat:qpxpmsn32jdh3astw66cf63uzm

Lattice-based digital signatures

Vadim Lyubashevsky
2021 National Science Review  
We briefly outline the high-level constructions of two digital signature schemes based on lattice problems.  ...  Lattice-based constructions generally present the most balanced options among cryptographic schemes offerring quantum security.  ...  While the domain of the function in discrete log and RSA-based one-way functions are groups, the domains in lattice-based signatures are sets that are not closed under any operation -in particular, they  ... 
doi:10.1093/nsr/nwab077 pmid:34691740 pmcid:PMC8433088 fatcat:emaz7k42mbffnc6f5wfrszfknu

Practical Lattice-Based Digital Signature Schemes

James Howe, Thomas Pöppelmann, Máire O'neill, Elizabeth O'sullivan, Tim Güneysu
2015 ACM Transactions on Embedded Computing Systems  
The focus of this presentation will be to survey recent developments in lattice-based digital signature schemes and in particular practical schemes that have been shown to improve upon the performance  ...  Its main advantage is that it allows for extended functionality and is, at the same time, more efficient for the basic primitives of public-key encryption and digital signatures.  ...  Lattice-based cryptographic primitives can be utilised to form more advanced schemes, while digital signatures and public-key encryption based on lattices are now more practical than RSAbased equivalent  ... 
doi:10.1145/2724713 fatcat:2cck3r7y3rb7jghfuinosibixu

Efficient Identity-Based Signature from Lattices [chapter]

Miaomiao Tian, Liusheng Huang
2014 IFIP Advances in Information and Communication Technology  
In this paper we present a new identity-based signature scheme from lattice problems.  ...  This scheme is more efficient than other lattice-based identity-based signature schemes in terms of both computation and communication complexities.  ...  Gaussians on Lattices The Gaussian function is a useful tool in lattice-based cryptography. Definition 2.  ... 
doi:10.1007/978-3-642-55415-5_26 fatcat:kbcwfgsubbcflmbgimbfyqca54

Post-Quantum Cryptography: State of the Art [chapter]

Johannes A. Buchmann, Denis Butin, Florian Göpfert, Albrecht Petzoldt
2016 Lecture Notes in Computer Science  
The most advanced scheme is the hash-based signature scheme XMSS [14] .  ...  Recent examples of lattice based public-key encryption schemes are [40, 69] and of lattice-based signature schemes are [22, 3] .  ... 
doi:10.1007/978-3-662-49301-4_6 fatcat:ylrv42q33fegnidacywmkzmvme

Satellite Networks for Key Management

A. Koltuksuz
2007 2007 3rd International Conference on Recent Advances in Space Technologies  
Elliptic Curve Digital Signature are those which utilize one single key that is used for the Algorithm (ECDSA) [9] Lattice Lattices & 1. Lattice based cryptosystems [10].  ...  Although the issue of secrecy that where E is an encryption function with an encryption key of k2 traditionally has been dealt with cryptographic solutions has On plaintext P to obtain the ciphertext of  ... 
doi:10.1109/rast.2007.4283958 fatcat:nj7p4zwauzf6johdxcwfpy7h7q

Asymptotically Efficient Lattice-Based Digital Signatures

Vadim Lyubashevsky, Daniele Micciancio
2017 Journal of Cryptology  
We give a direct construction of digital signatures based on the complexity of approximating the shortest vector in ideal (e.g., cyclic) lattices.  ...  Since no sub-exponential (in n) time algorithm is known to solve lattice problems in the worst case, even when restricted to cyclic lattices, our construction gives a digital signature scheme with an essentially  ...  with a novel construction of a lattice based one-time signature.  ... 
doi:10.1007/s00145-017-9270-z fatcat:gfylmwl4mbaxjid7j242gyiquu

Functional Encryption and Its Impact on Cryptography [chapter]

Hoeteck Wee
2014 Lecture Notes in Computer Science  
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained access control and selective computation on encrypted data, as is necessary to protect big, complex data  ...  In this article, we provide a brief introduction to functional encryption, and an overview of its overarching impact on the field of cryptography. ⋆ wee@di.ens.fr. CNRS (UMR 8548) and INRIA.  ...  Advances in attribute-based and functional encryption since 2012.  ... 
doi:10.1007/978-3-319-10879-7_18 fatcat:xpqhqqqjcnaddkdqwcvjpzcztu

Spectral and structural stability properties of charged particle dynamics in coupled latticesa)

Hong Qin, Moses Chung, Ronald C. Davidson, Joshua W. Burby
2015 Physics of Plasmas  
A theoretical framework and associated tools for analyzing the spectral and structural stability properties of coupled lattices are formulated in this paper, based on the recently developed generalized  ...  Courant-Snyder theory for coupled lattices.  ...  Starting from a stable lattice with a small phase advance, we can increase the focusing strength and thus the phase advance gradually.  ... 
doi:10.1063/1.4920961 fatcat:rf7dzruhrvblrixhgmm5jcfi4u

Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms

Rameez Asif
2021 IoT  
The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture  ...  by using computationally hard lattice problems (non-deterministic polynomial time hardness) to construct stable cryptographic functions.  ...  Alan Woodward from University of Surrey, UK for the valuable discussions and lectures on post-quantum cryptography. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/iot2010005 fatcat:ja6nldq4mjafhb2bcyzhxa7efu

Resistant Blockchain Cryptography to Quantum Computing Attacks

Zhwan Mohammed Khalid, Shavan Askar
2021 Zenodo  
In addition, the most promising post quantum signature encryption and digital blockchain signature schemes are detailed in terms of the functionality and durability of the most promising public signatures  ...  This paper reviews current scientists on quantum blockchain for such purposes. In addition, the major challenges are studied with the most important post-quantum blockchain systems.  ...  First, a lattice issue-based signature scheme was proposed. The lattice base delegation algorithm was used to generate hidden keys using a random value selection.  ... 
doi:10.5281/zenodo.4497731 fatcat:e55cprj7tfbedfxc4krs5jh4ry

An Efficient Identity-Based Forward Secure Signature Scheme from Lattices

Guang Wu, Ruwei Huang
2021 OALib  
In view of the excellent characteristics of lattice cipher and forward-secure digital signature scheme, the construction of identity-based forward-secure digital signature based on lattice technology has  ...  However, the identity-based forward secure digital signature scheme on the existing grid has the disadvantage of excessive signature length.  ...  In our research, we combine the trapdoor-free signature with the trapdoor base to realize the identity-based signature design that does not rely on the expansion of the lattice dimension, which will not  ... 
doi:10.4236/oalib.1107126 fatcat:fspbj32h4zdbdn6gco6nbfisni

Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?

Ayesha Khalid, Sarah McCarthy, Maire O'Neill, Weiqiang Liu
2019 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI)  
Thirdly, LBC constructions offer extended functionality for advanced security services such as identity-based encryption (IBE) [8] attributebased encryption (ABE) and fully-homomorphic encryption (FHE  ...  A further issue with standard lattice-based schemes is that they require matrix-vector multiplication with quadratic complexity.  ...  Lattice-based PQC KEMs Saber [16] Key  ... 
doi:10.1109/iwasi.2019.8791343 dblp:conf/iwasi/KhalidMOL19 fatcat:7evkdnumwjaqbc23e6pz3uz4sa

Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

Tiago M. Fernandez-Carames, Paula Fraga-Lamas
2020 IEEE Access  
However, the fast progress of quantum computing has opened the possibility of performing attacks based on Grover's and Shor's algorithms in the near future.  ...  Furthermore, extensive comparisons are provided on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains.  ...  This kind of schemes date back from the late 70s, when Lamport proposed a signature scheme based on a one-way function [198] .  ... 
doi:10.1109/access.2020.2968985 fatcat:7wsxhxrfojdmzcxtjtrk6cmcci

Page 10576 of Mathematical Reviews Vol. , Issue 2004m [page]

2004 Mathematical Reviews  
These techniques are used to construct lattice-based collision- resistant hash functions.  ...  The eighth chapter, “Cryptographic functions”, describes gen- eral techniques used to design lattice-based cryptographic systems.  ... 
« Previous Showing results 1 — 15 out of 29,716 results